• Title/Summary/Keyword: 공급망 보안

Search Result 87, Processing Time 0.039 seconds

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

Design and Implementation of VPN System based on Linux for safe Extranet (안전한 엑스트라넷 구성을 위한 리눅스기반 VPN 설계 및 구현)

  • 정성재;장희진;소웅영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.25-27
    • /
    • 2003
  • 최근의 기업의 업무관련 네트워크가 인터넷의 발달, 글로벌(Global)경영, 전자상거래의 발달 등으로 인하여 전용선을 구축하여 인트라넷(Intranet) 환경에서 처리하던 업무들을 엑스트라넷(Extranet) 환경으로 확장하게 되었다. 엑스트라넷은 해당 기업의 여러 지사뿐만 아니라, 제조업체, 공급업체, 협력업체, 고객, 다른 비즈니스업체들과 안전한 공유를 위해서는 꼭 필요하다. 그러나, 이러한 엑스트라넷 구성은 비용적인 측면과 보안적인 측면 모두 고려해야된다. 현재의 추세는 기존의 공중망을 이용하여 사설망처럼 사용하는 VPN(Virtual Private Network)를 구성하고 있다. 본 논문에서는 리눅스기반하에 IPsec 프로토콜을 사용하여 VPN을 구성할 수 있는 freeS/WAN과 방화벽기능을 하는 패킷 필터링(Packet Filtering) 프로그램인 iptables를 이용하여 비용적 부담이 적고 안전한 엑스트라넷을 구성하고자 한다.

  • PDF

A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure (Diskless와 Stateless 보안정책 기반의 고속화 동기 네트워크 인프라 구현에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.673-681
    • /
    • 2011
  • Among the network information services combined with a number of security technologies and required security policies, Infrastructure as a Service, a hardware plat-form service of Cloud Computing, has been provided since 2011. It is more or less similar to the existing central concentration method services, in terms of the specifications and technical aspects for given hardware category, but it is entirely different from them in that it overcomes the spatial limitations of specific network and targets the public network. Information security technology has also been prospering so that it could ensure the stability of offered hardware plat-forms. As currently supported hardware, Internet Data Center has been provided by virtualizing the previously offered servers and discs (backup discs), but the hardware plat-forms offered are somewhat limited. Meanwhile, the areas of security fields for offered services are confined to the center or include the TCP/IP-based SSL (Secure Sockets Layer) for the public network connected with clients, which shows that microscopic access security policies have been used. Therefore, this study was aimed to provide a realistic security mechanism for realizing defense policy, by expanding service areas into security devices and suggesting Diskless and Stateless security policy based high-speed synchronous network infrastructure.

A Study on Logistics Security Recognition of Domestic Logistics Enterprises (국내물류기업의 물류보안 인식에 관한 연구)

  • Lee, Jea-Won;Ryu, Hyung-Geun;Yeon, Joung-Hum
    • Journal of Navigation and Port Research
    • /
    • v.34 no.1
    • /
    • pp.45-50
    • /
    • 2010
  • After September 11 attacks, as recently the range about security of physical distribution is rapidly spreading temporally & spatially, and it considers that the demand of understanding about logistics company is more than that of the past, now is the time that to establish policy for a comprehensive and systematic support policy that targets the entire supply chain considering the competitive of logistics beyond the responsibility for security of the field of import and export simply. In this respect, this study has identified recognition of domestic logistics company about global logistics security system that has recently been implemented in the country, and this level of recognition has really examined what is the impact of its logistics competitiveness and an intention to invest in related areas in the future. Based on this, this study has also proposed the supporting promotion and education for the expansion of logistics security of government & related agencies and effective way promoting to establish policies regarding this.

A Study on the Enterprise Application Framework for Developing Efficient RFID Applications (효율적인 RFID 애플리케이션 개발을 위한 엔터프라이즈 애플리케이션 프레임워크에 관한 연구)

  • An, Kyu-Hee;Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.2
    • /
    • pp.269-280
    • /
    • 2008
  • The information flow through RFID techniques such as, standardized EPC and EPCglobal network suggests new change in the method of cooperating and sharing information in the supply chain. Common function should be prepared for communication, security techniques, and business processes based on the EPCglobal standard to introduce efficient RFID techniques. And the standard architecture which can deal with the RFID environment flexibly is quite necessary. Therefore, this paper suggests Enterprise Application Framework (EAF) for developing efficient and secure RFID applications. EAF offers essential services to develop RFID enterprise systems : a communication environment which uses various standard communication protocols, a security function based on PKI, and abstract business services for flexible introduction of RFID businesses. It simplifies the RFID business integration, minimizes the development complexity, and thus EAF is expected to reduce the cost of RFID application development. EAF guarantees constructing secure RFID applications due to PKI-based security mechanism.

  • PDF

A Study on Efficient Distributed Data Processing POS System of PKI Based (PKI 기반의 효율적인 분산처리 Point of sales 시스템에 관한 연구)

  • Park Gil-Cheol;Kim Seok-Soo;Kang Min-Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.43-50
    • /
    • 2005
  • POS system that become that is supply net administration and computerization fetters of customer management that become point in istribution network constructed database and use XML-Encryption that is certificate techniques of PKI and standard of security for security that is XML's shortcoming and design distributed processing POS system using XML for data integration by introduction of Ubiquitous concept. This POS system has four advantages. First, Because there is no server, need not to attempt authentication and data transmission every time. Second, can integrate data base by XML and improve portability of program itself. Third, XML data in data transmission because transmit data after encryption data safe .Fourth, After encode whenever process data for data breakup anger of POS system client program and elevation of the processing speed, transmit at because gathering data at data transmission.

  • PDF

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Electricity Consumption Information Transmission Protocol with ID-based Key Distribution Method (ID 기반 키 분배 기법을 활용한 전력사용량 정보 전송 프로토콜)

  • Jung, Su-Young;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.709-716
    • /
    • 2012
  • Recently, smartgrid has interested in enable to existing electrical grid to supplying stably and efficient energy management. Smartgrid environment using PLC is transmit PLC module collected electricity consumption information in each house from PLC module to server. This communication process can occurred security threats such as personal information leak of consumer, electrical grid paralysis. In this paper, we propose efficient electricity consumption information transmission protocol with ID-based key distribution method for respond to security threats.

A Study on Impact of the U.S. Security Initiatives on Korean Participants in Global Supply Chain (미국물류보안규범이 우리나라의 공급망 참여자에 미치는 영향과 대응방안)

  • Huh, Eun-Sook
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.217-236
    • /
    • 2008
  • The purpose of this paper is to discuss the impact of the New Container Security Initiatives of U.S., CSI(Container Security Initiative) and C-TPAT(Customs-Trade Partnership against Terrorism). The CSI which aims to pre-screen high-risk containers in ports of loading. It is a unilateral effort that seeks to develop bi-lateral agreements between the United States and foreign countries with significant container trade volumes into the U.S. C-TPAT is a voluntary initiative to develop cooperative security relationships between the U.S. government and U.S. firms in the global supply chain. Government and Industry have already responded with proposals to create more confidence in supply chain security. These proposals call for heightened inspection and scrutiny of the goods flowing through a supply chain, increased information exchange among participants of supply chain. While government and the private sector are working together to launch new initiative to create more secure and reliable supply chains, industry is rapidly exploring the potential of new technologies such as RFID. The security recommendations will eventually become the requirements to be complied with by importers and their supplier extending to the carriers. It is needed that Korean shippers involved in US importer's supply chain should pay attention to the requirements and start implementing the security measures.

  • PDF

Design of Authentication Protocol for User Identification in IMT-2000 (IMT-2000에서 사용자 식별을 위한 인증 프로토콜 설계)

  • 서동운;남기모;박재균;강성용;김정훈;박석천
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.11a
    • /
    • pp.331-334
    • /
    • 2000
  • IMT-2000은 유선통신 시장에서 확고히 자리잡은 인터넷 서비스와 멀티미디어 고속 데이터정보를 무선으로 공급하고자 하는 사용자의 요구를 충족시키기 위해 등장하였다. 그러나 이러한 서비스는 무선망을 통하여 제공되기 때문에 그 특성상 전송로가 노출되어 있어 허가반지 않은 사용자에 의한 불법적인 절취사용과 악의를 가진 제3자가 공유된 전송매체를 통해 전파를 도청하기 쉽다는 문제점을 가지고 있다 따라서 이동 무선 환경에서의 보안과 인증문제는 필수적인 사항이라고 할 수 있다. 이를 위해 본 논문에서는 기존의 인증 방식을 분석하고 사용자의 식별을 위한 쌍방향 인증 프로토콜을 설계하고 그 효율성을 분석하였다.

  • PDF